Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.120670
Category:Amazon Linux Local Security Checks
Title:Amazon Linux: Security Advisory (ALAS-2016-680)
Summary:The remote host is missing an update for the 'tomcat7' package(s) announced via the ALAS-2016-680 advisory.
Description:Summary:
The remote host is missing an update for the 'tomcat7' package(s) announced via the ALAS-2016-680 advisory.

Vulnerability Insight:
ResourceLinkFactory.setGlobalContext() is a public method and was discovered to be accessible by web applications running under a security manager without any checks. This allowed a malicious web application to inject a malicious global context that could in turn be used to disrupt other web applications and/or read and write data owned by other web applications. (CVE-2016-0763)

The Manager and Host Manager applications were discovered to establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token. (CVE-2015-5351)

The Mapper component processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character. (CVE-2015-5345)

The session-persistence implementation was discovered to mishandle session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. (CVE-2016-0714)

It was discovered that org.apache.catalina.manager.StatusManagerServlet was not placed on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application. (CVE-2016-0706)

Affected Software/OS:
'tomcat7' package(s) on Amazon Linux.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-5345
BugTraq ID: 83328
http://www.securityfocus.com/bid/83328
Bugtraq: 20160222 [SECURITY] CVE-2015-5345 Apache Tomcat Directory disclosure (Google Search)
http://seclists.org/bugtraq/2016/Feb/146
Debian Security Information: DSA-3530 (Google Search)
http://www.debian.org/security/2016/dsa-3530
Debian Security Information: DSA-3552 (Google Search)
http://www.debian.org/security/2016/dsa-3552
Debian Security Information: DSA-3609 (Google Search)
http://www.debian.org/security/2016/dsa-3609
http://seclists.org/fulldisclosure/2016/Feb/122
https://security.gentoo.org/glsa/201705-09
HPdes Security Advisory: HPSBUX03561
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html
http://www.qcsec.com/blog/CVE-2015-5345-apache-tomcat-vulnerability.html
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
RedHat Security Advisories: RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1087
RedHat Security Advisories: RHSA-2016:1088
https://access.redhat.com/errata/RHSA-2016:1088
RedHat Security Advisories: RHSA-2016:1089
http://rhn.redhat.com/errata/RHSA-2016-1089.html
RedHat Security Advisories: RHSA-2016:2045
http://rhn.redhat.com/errata/RHSA-2016-2045.html
RedHat Security Advisories: RHSA-2016:2599
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://www.securitytracker.com/id/1035071
SuSE Security Announcement: SUSE-SU-2016:0769 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
SuSE Security Announcement: SUSE-SU-2016:0822 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
SuSE Security Announcement: SUSE-SU-2016:0839 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
SuSE Security Announcement: openSUSE-SU-2016:0865 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://www.ubuntu.com/usn/USN-3024-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-5351
BugTraq ID: 83330
http://www.securityfocus.com/bid/83330
Bugtraq: 20160222 [SECURITY] CVE-2015-5351 Apache Tomcat CSRF token leak (Google Search)
http://seclists.org/bugtraq/2016/Feb/148
http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html
RedHat Security Advisories: RHSA-2016:2807
http://rhn.redhat.com/errata/RHSA-2016-2807.html
RedHat Security Advisories: RHSA-2016:2808
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://www.securitytracker.com/id/1035069
Common Vulnerability Exposure (CVE) ID: CVE-2016-0706
BugTraq ID: 83324
http://www.securityfocus.com/bid/83324
Bugtraq: 20160222 [SECURITY] CVE-2016-0706 Apache Tomcat Security Manager bypass (Google Search)
http://seclists.org/bugtraq/2016/Feb/144
Common Vulnerability Exposure (CVE) ID: CVE-2016-0714
BugTraq ID: 83327
http://www.securityfocus.com/bid/83327
Bugtraq: 20160222 [SECURITY] CVE-2016-0714 Apache Tomcat Security Manager Bypass (Google Search)
http://seclists.org/bugtraq/2016/Feb/145
http://www.securitytracker.com/id/1037640
Common Vulnerability Exposure (CVE) ID: CVE-2016-0763
BugTraq ID: 83326
http://www.securityfocus.com/bid/83326
Bugtraq: 20160222 [SECURITY] CVE-2016-0763 Apache Tomcat Security Manager Bypass (Google Search)
http://seclists.org/bugtraq/2016/Feb/147
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179356.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.